ID

VAR-201905-0766


CVE

CVE-2018-15388


TITLE

Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software depletion vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-015391

DESCRIPTION

A vulnerability in the WebVPN login process of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause increased CPU utilization on an affected device. The vulnerability is due to excessive processing load for existing WebVPN login operations. An attacker could exploit this vulnerability by sending multiple WebVPN login requests to the device. A successful exploit could allow the attacker to increase CPU load on the device, resulting in a denial of service (DoS) condition. Multiple Cisco Products are prone to an remote denial-of-service vulnerability. This issue is being tracked by Cisco Bug ID CSCvj33780. This vulnerability stems from improper management of system resources (such as memory, disk space, files, etc.) by network systems or products

Trust: 1.98

sources: NVD: CVE-2018-15388 // JVNDB: JVNDB-2018-015391 // BID: 108137 // VULHUB: VHN-125642

AFFECTED PRODUCTS

vendor:ciscomodel:adaptive security appliance softwarescope:ltversion:9.4.4.34

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:gteversion:9.5

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:gteversion:9.9

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:ltversion:9.9.2.50

Trust: 1.0

vendor:ciscomodel:firepower threat defensescope:ltversion:6.2.3.12

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:gteversion:9.7

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:ltversion:9.8.4

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:ltversion:9.6.4.25

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope: - version: -

Trust: 0.8

vendor:ciscomodel:firepower threat defense softwarescope: - version: -

Trust: 0.8

vendor:ciscomodel:firepower threat defense virtualscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:firepower threat defense softwarescope:eqversion:6.2.3

Trust: 0.3

vendor:ciscomodel:firepower threat defense softwarescope:eqversion:6.2.2

Trust: 0.3

vendor:ciscomodel:firepower threat defense softwarescope:eqversion:6.2.1

Trust: 0.3

vendor:ciscomodel:firepower threat defense softwarescope:eqversion:6.2

Trust: 0.3

vendor:ciscomodel:firepower threat defense softwarescope:eqversion:6.1

Trust: 0.3

vendor:ciscomodel:firepower threat defense softwarescope:eqversion:6.0.1

Trust: 0.3

vendor:ciscomodel:firepower threat defense softwarescope:eqversion:6.2.2.3

Trust: 0.3

vendor:ciscomodel:firepower threat defense softwarescope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:firepower security appliancescope:eqversion:93000

Trust: 0.3

vendor:ciscomodel:firepower series security appliancesscope:eqversion:41000

Trust: 0.3

vendor:ciscomodel:firepower series security appliancescope:eqversion:21000

Trust: 0.3

vendor:ciscomodel:asa services module for cisco catalyst series switchesscope:eqversion:65000

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55050

Trust: 0.3

vendor:ciscomodel:asa series firewallsscope:eqversion:5500-x0

Trust: 0.3

vendor:ciscomodel:asa cloud firewallscope:eqversion:1000v0

Trust: 0.3

vendor:ciscomodel:adaptive security virtual appliancescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.5

Trust: 0.3

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.4

Trust: 0.3

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.9

Trust: 0.3

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.8

Trust: 0.3

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.7

Trust: 0.3

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.6

Trust: 0.3

vendor:ciscomodel:series industrial security appliancescope:eqversion:30000

Trust: 0.3

vendor:ciscomodel:firepower threat defense softwarescope:neversion:6.2.3.12

Trust: 0.3

vendor:ciscomodel:adaptive security appliance softwarescope:neversion:9.8.4

Trust: 0.3

vendor:ciscomodel:adaptive security appliance softwarescope:neversion:9.9.2.50

Trust: 0.3

vendor:ciscomodel:adaptive security appliance softwarescope:neversion:9.6.4.25

Trust: 0.3

vendor:ciscomodel:adaptive security appliance softwarescope:neversion:9.4.4.34

Trust: 0.3

sources: BID: 108137 // JVNDB: JVNDB-2018-015391 // NVD: CVE-2018-15388

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-15388
value: HIGH

Trust: 1.0

ykramarz@cisco.com: CVE-2018-15388
value: HIGH

Trust: 1.0

NVD: CVE-2018-15388
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201905-023
value: HIGH

Trust: 0.6

VULHUB: VHN-125642
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-15388
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-125642
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-15388
baseSeverity: HIGH
baseScore: 8.6
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 4.0
version: 3.0

Trust: 2.8

sources: VULHUB: VHN-125642 // JVNDB: JVNDB-2018-015391 // CNNVD: CNNVD-201905-023 // NVD: CVE-2018-15388 // NVD: CVE-2018-15388

PROBLEMTYPE DATA

problemtype:CWE-400

Trust: 1.9

sources: VULHUB: VHN-125642 // JVNDB: JVNDB-2018-015391 // NVD: CVE-2018-15388

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201905-023

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201905-023

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-015391

PATCH

title:cisco-sa-20190501-sd-cpu-dosurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-sd-cpu-dos

Trust: 0.8

title:Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Remediation of resource management error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=92174

Trust: 0.6

sources: JVNDB: JVNDB-2018-015391 // CNNVD: CNNVD-201905-023

EXTERNAL IDS

db:NVDid:CVE-2018-15388

Trust: 2.8

db:BIDid:108137

Trust: 1.0

db:JVNDBid:JVNDB-2018-015391

Trust: 0.8

db:CNNVDid:CNNVD-201905-023

Trust: 0.7

db:AUSCERTid:ESB-2019.1510.2

Trust: 0.6

db:VULHUBid:VHN-125642

Trust: 0.1

sources: VULHUB: VHN-125642 // BID: 108137 // JVNDB: JVNDB-2018-015391 // CNNVD: CNNVD-201905-023 // NVD: CVE-2018-15388

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190501-sd-cpu-dos

Trust: 2.0

url:https://nvd.nist.gov/vuln/detail/cve-2018-15388

Trust: 1.4

url:http://www.cisco.com/

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-15388

Trust: 0.8

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190501-asa-ftd-ike-dos

Trust: 0.6

url:https://www.auscert.org.au/bulletins/80090

Trust: 0.6

url:https://www.securityfocus.com/bid/108137

Trust: 0.6

url:https://vigilance.fr/vulnerability/cisco-asa-infinite-loop-via-webvpn-login-process-29191

Trust: 0.6

sources: VULHUB: VHN-125642 // BID: 108137 // JVNDB: JVNDB-2018-015391 // CNNVD: CNNVD-201905-023 // NVD: CVE-2018-15388

CREDITS

The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.,Jason Moulder of Pratum

Trust: 0.6

sources: CNNVD: CNNVD-201905-023

SOURCES

db:VULHUBid:VHN-125642
db:BIDid:108137
db:JVNDBid:JVNDB-2018-015391
db:CNNVDid:CNNVD-201905-023
db:NVDid:CVE-2018-15388

LAST UPDATE DATE

2024-08-14T13:45:03.550000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-125642date:2019-10-09T00:00:00
db:BIDid:108137date:2019-05-01T00:00:00
db:JVNDBid:JVNDB-2018-015391date:2019-05-31T00:00:00
db:CNNVDid:CNNVD-201905-023date:2019-05-14T00:00:00
db:NVDid:CVE-2018-15388date:2023-08-15T15:24:56.340

SOURCES RELEASE DATE

db:VULHUBid:VHN-125642date:2019-05-03T00:00:00
db:BIDid:108137date:2019-05-01T00:00:00
db:JVNDBid:JVNDB-2018-015391date:2019-05-31T00:00:00
db:CNNVDid:CNNVD-201905-023date:2019-05-01T00:00:00
db:NVDid:CVE-2018-15388date:2019-05-03T15:29:00.227